Telecommunications Science ›› 2022, Vol. 38 ›› Issue (2): 59-70.doi: 10.11959/j.issn.1000-0801.2022008
• Research and Development • Previous Articles Next Articles
Shuai REN1, Lei SHI1, Binbin WANG1, Huirong CHENG1, Qianqian ZHANG1, Honglin LIU2
Revised:
2022-01-07
Online:
2022-02-20
Published:
2022-02-01
Supported by:
CLC Number:
Shuai REN, Lei SHI, Binbin WANG, Huirong CHENG, Qianqian ZHANG, Honglin LIU. Multi-carrier information hiding algorithm based on three-dimensional model’s concave-convex structure characteristics[J]. Telecommunications Science, 2022, 38(2): 59-70.
"
凹凸度区间 | α1 | α2 | 凹凸度区间 | α1 | α2 |
(-1,-0.75] | (157.5°,180°] | (0°,22.5°] | (0,0.25] | (67.5°,90°] | (90°,112.5°] |
(-0.75,-0.5] | (135°,157.5°] | (22.5°,45°] | (0.25,0.5] | (45°,67.5°] | (112.5°,135°] |
(-0.5,-0.25] | (112.5°,135°] | (45°,67.5°] | (0.5,0.75] | (22.5°,45°] | (135°,157.5°] |
(-0.25,0] | (90°,112.5°] | (67.5°,90°] | (0.75,1) | (0°,22.5°] | (157.5°,180°] |
[1] | 任帅, 王震, 徐振超 ,等. 一种基于 OBJ 三维模型纹理贴图的信息隐藏算法[J]. 北京邮电大学学报, 2019,42(1): 22-27. |
REN S , WANG Z , XU Z C ,et al. Information hiding scheme based on texture mapping of 3D model in OBJ format[J]. Journal of Beijing University of Posts and Telecommunications, 2019,42(1): 22-27. | |
[2] | 张启龙, 温涛, 宋晓莹 ,等. 基于自适应直方图修改的网格可逆信息隐藏[J]. 东北大学学报(自然科学版), 2020,41(3): 316-320,360. |
ZHANG Q L , WEN T , SONG X Y ,et al. Reversible data hiding algorithm based on adaptive histogram modification for 3D mesh models[J]. Journal of Northeastern University (Natural Science), 2020,41(3): 316-320,360. | |
[3] | ZHOU H , CHEN K J , ZHANG W M ,et al. Distortion design for secure adaptive 3-D mesh steganography[J]. IEEE Transactions on Multimedia, 2019,21(6): 1384-1398. |
[4] | TSAI Y Y . Separable reversible data hiding for encrypted three-dimensional models based on spatial subdivision and space encoding[J]. IEEE Transactions on Multimedia, 2021(23): 2286-2296. |
[5] | WANG P S , LIU Y , GUO Y X ,et al. O-CNN:Octree-based convolutional neural networks for 3D shape analysis[J]. ACM Transactions on Graphics, 2017,36(4): 72. |
[6] | KER A D , . Batch steganography and pooled steganalysis[C]// IH'06:Proceedings of the 8th International Conference on Information Hiding, 2006: 265-281. |
[7] | 张新鹏, 钱振兴, 李晟 . 信息隐藏研究展望[J]. 应用科学学报, 2016,34(5): 475-489. |
ZHANG X P , QIAN Z X , LI S . Prospect of digital steganography research[J]. Journal of Applied Sciences, 2016,34(5): 475-489. | |
[8] | 任帅, 王震, 苏东旭 ,等. 基于三维模型贴图与结构数据的信息隐藏算法[J]. 通信学报, 2019,40(5): 211-222. |
REN S , WANG Z , SU D X ,et al. Information hiding algorithm based on mapping and structure data of 3D model[J]. Journal on Communications, 2019,40(5): 211-222. | |
[9] | 任帅, 徐振超, 王震 ,等. 基于多融合态的低密度三维模型信息隐藏算法[J]. 计算机应用, 2019,39(4): 1100-1105. |
REN S , XU Z C , WANG Z ,et al. Low-density 3D model information hiding algorithm based on multple fusion states[J]. Journal of Computer Applications, 2019,39(4): 1100-1105. | |
[10] | 张满囤, 燕明晓, 马英石 ,等. 基于八叉树结构的三维体素模型检索[J]. 计算机学报, 2021,44(2): 334-346. |
ZHANG M D , YAN M X , MA Y S ,et al. 3D voxel model retrieval based on Octree structure[J]. Chinese Journal of Computers, 2021,44(2): 334-346. | |
[11] | 杨军, 王亦民 . 基于深度卷积神经网络的三维模型识别[J]. 重庆邮电大学学报(自然科学版), 2019,31(2): 253-260. |
YANG J , WANG Y M . 3D model recognition based on depth convolution neural network[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2019,31(2): 253-260. | |
[12] | 郑乐乐 . 基于凹凸性和形状直径函数的三维模型分割[D]. 太原:中北大学, 2018. |
ZHENG L L . Three-dimensional model segmentation based on weak convexity and shape diameter function[D]. Taiyuan:North University of China, 2018. | |
[13] | CHAKRABORTY S , PAUL D , DAS S ,et al. Automated clustering of high-dimensional data with a feature weighted mean shift algorithm[C]// Proceedings of the 35th AAAI Conference on Artificial Intelligence/33rd Conference on Innovative Applications of Artificial Intelligence/11th Symposium on Educational Advances in Artificial Intelligence,Electr Network, 2021. |
[14] | LIU J , LI R , LIU Y ,et al. Research on signal-to-noise ratio estimation algorithm in wireless communication[J]. Computer Engineering and Application, 2020,56(18): 82-9. |
[1] | Qiuyu ZHANG, Yujie SONG. A dual speech encryption algorithm based on improved Henon mapping and hyperchaotic [J]. Telecommunications Science, 2021, 37(12): 11-24. |
[2] | Zhaopin SU, Chaoyong SHEN, Guofu ZHANG, Feng YUE, Donghui HU. A robust audio steganography algorithm based on differential evolution [J]. Telecommunications Science, 2021, 37(11): 64-74. |
[3] | Nannan LI, Yu HAN, Ning GAO, Shi JIN. Joint amplitude and phase partition based physical layer key generation method [J]. Telecommunications Science, 2021, 37(5): 100-112. |
[4] | Yong CHEN,Wensheng YAO,Jingxiang CHEN,Huan LIANG,Jing LI. Cloud native approach of agile cloud-network converged application delivery [J]. Telecommunications Science, 2020, 36(12): 96-104. |
[5] | Long XUE,Gang LU,Qi ZHOU,Huiyan ZHANG,Tingjun WAN. Cloud native intelligent operation and maintenance technology [J]. Telecommunications Science, 2020, 36(12): 105-112. |
[6] | Mengyao LU,Hongyu TANG,Wei TANG,Jian ZHANG. Adaptive security architecture defense platform based on software defined security [J]. Telecommunications Science, 2020, 36(12): 133-138. |
[7] | Yuqing ZHONG,Hao WANG,Zebing LIN,Min WANG,Liye CHEN. Design of multi-key encryption method [J]. Telecommunications Science, 2020, 36(11): 89-97. |
[8] | Mingxia BO,Hongyu TANG,Chen MA,Jian ZHANG. Application of security threat intelligence based on big data analysis in telecom operators [J]. Telecommunications Science, 2020, 36(11): 127-133. |
[9] | Feng LIN,Liujing XU,Xiaohua CHEN,Weiqiang QI,Ke CHEN,Tiantian ZHU. Method of Webshell detection based on multi-view feature fusion [J]. Telecommunications Science, 2020, 36(6): 125-132. |
[10] | Huifang JI,Liandong LIU,Yanyan HUANG,Qingfeng CHENG. A mutual and anonymous heterogeneous signcryption scheme between PKI and IBC [J]. Telecommunications Science, 2020, 36(4): 91-98. |
[11] | Yuan CHEN,Tieming CHEN,Qijie SONG,Dongjie MA. IBEXSec:a universal security framework for industrial internet terminal access [J]. Telecommunications Science, 2020, 36(3): 19-26. |
[12] | Daoyuan LIU,Keda SUN,Junliang ZHOU,Haidong FAN. Application of fuzzy comprehensive evaluation method in network information security assessment of electric power enterprises [J]. Telecommunications Science, 2020, 36(3): 34-41. |
[13] | Yanhua LU,Youliang TIAN,Chen LIU. Multi-server conjunctive keyword searchable encryption scheme based on BDH problem [J]. Telecommunications Science, 2020, 36(2): 13-23. |
[14] | Guowei WU,Ning FAN,Laifu WANG,Shuai WANG,Jun SHEN,Huamin JIN. Accelerated algorithm in attribute-based encryption over cloud environment [J]. Telecommunications Science, 2019, 35(11): 101-107. |
[15] | Dongjie MA,Chengqiang JIN,·uan CHEN,Tieming CHEN. GreyFan:a network attack framework using Wi-Fi covert channel [J]. Telecommunications Science, 2019, 35(9): 85-97. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|